“how to use portspoof ( cyber deception ) how to use portspoof ( cyber deception ) hello and welcome, and in this video, we ’ re going to be talking a little bit about portspoof, a fantastic utility that takes your unused tcp / ip ports and turns them into something different when…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1046Network Service Discovery
97%
“it says it ’ s an apache webserver or whatever. we can use those signatures, and to be honest, nmap uses those signatures to adequately identify what the remote application is on the other side. so now if we run an actual scan against it, we ’ re now going to do nmap space - af, …”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1046Network Service Discovery
97%
“lot of noise for the attacker, but that ’ s kind of the point. remember, detection time plus reaction time must be less than the amount of time it takes for an attacker to successfully attack your network. so now we have greatly increased the amount of time it takes for an attack…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
T1046Network Service Discovery
96%
“to say, well about 70 % done, one ’ s completed and here are the results. now, if you look at this point, portspoof is now completely messed with us because it ’ s saying that port 1 is open, the service is telnet, and it believes that it ’ s a tanberg nps, 800 telnet d server. i…”
Which technique(s) should be tagged here? Pick zero or more — leaving blank just records that the original was wrong.
No matches for .
Loading techniques…
Summary
Hello and welcome, and in this video, we’re going to be talking a little bit about Portspoof, a fantastic utility that takes your unused TCP/IP ports and turns them into […]